CVE-2010-2575
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
30/08/2010
Last modified:
11/04/2025
Description
Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp in Okular in KDE SC 4.3.0 through 4.5.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image in a PDB file.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kde_sc:4.5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046448.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046524.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046542.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://secunia.com/advisories/40952
- http://secunia.com/advisories/41086
- http://secunia.com/advisories/41132
- http://secunia.com/secunia_research/2010-109/
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.340142
- http://www.kde.org/info/security/advisory-20100825-1.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A162
- http://www.osvdb.org/67454
- http://www.securityfocus.com/archive/1/513341/100/0/threaded
- http://www.ubuntu.com/usn/USN-979-1
- http://www.vupen.com/english/advisories/2010/2178
- http://www.vupen.com/english/advisories/2010/2179
- http://www.vupen.com/english/advisories/2010/2202
- http://www.vupen.com/english/advisories/2010/2206
- http://www.vupen.com/english/advisories/2010/2219
- http://www.vupen.com/english/advisories/2010/2230
- https://bugzilla.redhat.com/show_bug.cgi?id=627289
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61371
- http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046448.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046524.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046542.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://secunia.com/advisories/40952
- http://secunia.com/advisories/41086
- http://secunia.com/advisories/41132
- http://secunia.com/secunia_research/2010-109/
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.340142
- http://www.kde.org/info/security/advisory-20100825-1.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A162
- http://www.osvdb.org/67454
- http://www.securityfocus.com/archive/1/513341/100/0/threaded
- http://www.ubuntu.com/usn/USN-979-1
- http://www.vupen.com/english/advisories/2010/2178
- http://www.vupen.com/english/advisories/2010/2179
- http://www.vupen.com/english/advisories/2010/2202
- http://www.vupen.com/english/advisories/2010/2206
- http://www.vupen.com/english/advisories/2010/2219
- http://www.vupen.com/english/advisories/2010/2230
- https://bugzilla.redhat.com/show_bug.cgi?id=627289
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61371



